Endpoint and Mobile Security

Protecting every access point

The software and policies we provide as part of our endpoint and mobile security solutions protect devices while on public or private networks. Six Degrees Consulting has worked in this field at its inception, allowing us to stay well ahead of changes even as the field continues to expand and grow more complex.

Web browsers and email clients are the two types of endpoints that most often come to mind, but any device that connects to an enterprise network is an end point and creates risks that have to be taken into account. Many of these end points are mobile devices that are owned by employees rather than the enterprise. This creates a need for specialized solutions, policies and software with the flexibility to protect all types of devices and networks.

Endpoint / Mobile Security Illustration – Six Degrees Consulting

We partner with Check Point to provide the industry’s best possible endpoint and mobile security solutions. Check Point SandBlastTM Agent combines everything needed for advanced endpoint protections, including anti-ransomware, anti-bot, anti-exploit, zero phishing, forensics, threat emulation, threat extraction and mobile threat prevention. All aspects of these solutions can be managed from a single console. It provides security management with unified policies, centralized reporting and actionable forensics.

Partnership with Check Point and a comprehensive knowledge of the field assure that Six Degrees Consulting is able to develop solutions that match the distinct needs of your business.

Services and solutions

  • SandBlastTM Agent (SBA)
  • Mobile threat prevention (MTP)
  • Endpoint policy management
  • Event management and reporting

SDC expertise

  • Threat emulation and extraction
  • Full disk encryption
  • Media encryption and port protection
  • Remote access VPN
  • Anti-malware
  • Firewall and compliance check
  • Mobile threat prevention
  • Mobile secure work space (Capsule Docs)
  • Anti-malware, ransomware, anti-bot, anti-phishing and anti-exploit
  • Enterprise security management and reporting
  • Assessments, planning and deployments

Example case study

Enterprise security